2-6 Flashcards
essentially a technique used by hackers to gain unauthorized access to computers. its occasionally done to maskthe origins of a DoS attack
ip spoofing
these often mask the actual IP address from which they are attacking
DoS and DDoS
The intruder sends messages to a computer system with an IP address indicating that the message came from a different IP address then it actually came from
ip spoofing
a couple of different ways to address IP spoofing includes _______
do not reveal any info reguarding your internal IP address
monitor incoming IP packets for signs of IP spoofing using software / firewall
a danger of ip spoofing includes some firewalls do not ______________
examine packets that appear to come from inside the netowrk
a process whereby a hacker takes over a tcp session between two machines
TCP hijacking
sourced routed ip packets allow a hacker at point a in a network to participate in a conversation between point b and c encouraging the IP packets to pass through the hackers machine
session hacking
the most common form of session hacking is
man in the middle attack
the point of ______________________ is to exploit trust and to gain aces to a system to which one would not otherwise have access
hijacking a connection
the ony way to prevent session hijacking is to use
encrypted transmissions
software that intercepts packets going across a network or the internet and copies them
packet sniffer
a program that self replicates
virus
a virus that an replicate without human interaction
worm
famous virus with rapid high volume scanning
Slammer virus
key to topping a computer virus is to
prevent it from spreading to other systems